Abstract
The safe operation of the network is the focus of the network operators, and testing the security of the network is an important indicator for evaluating the network. A comprehensive contains various devices, operating systems, software and hardware, and many different users. How to evaluate the security of the network is a problem considered by network security personnel. Drawing lessons from the ideas of the red army and the blue army’s confrontation exercises in military exercises, this article proposes to conduct actual offensive and defensive exercises on the network from the perspective of the red team, to study the attack methods used in different stages of the network offensive and defensive, and to provide some experience for improving the security of the network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhang, M.: Analysis of situational teaching method in network security course. Sci. Educ. Guide. 5(9), 148–149 (2019)
Guofang, Z.: The web penetration based SQL injection. Lect. Notes Electr. Eng. 551, 12 (2019)
Zhang, Q.: Exploration on the integration of red blue confrontation and safety supervision. Electr. Des. Eng. 8(11), 127–128 (2015)
Guofang, Z., Weitao, L.: A security reinforcement scheme for the server. WOP Educ. Soc. Sci. Psychol. 14(7), 92 (2018)
Georgia, W.: Penetration Test. People’s post and telecommunications press, China, vol. 5, pp. 124–125 (2019)
Guofang, Z.: Research on mobile security communication based on digital fingerprint encryption. Adv. Eng. Appl. Sci. Res. 3, 403–407 (2019)
Red blue confrontation. https://he1m4n6a.github.io/
Red blue confrontation. https://www.secpulse.com/archives/107194.html
Common network attack technology. https://blog.csdn.net/qq_39507276/article/details/88883421
Acknowledgement
This paper is supported by “Research project of higher education and teaching reform of Hainan Provincial Department of Education: Hnjg2020-144”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, G., Zhou, R. (2021). Research on the Breakthrough of Defense System from the Perspective of Red Team. In: Xu, Z., Parizi, R.M., Loyola-González, O., Zhang, X. (eds) Cyber Security Intelligence and Analytics. CSIA 2021. Advances in Intelligent Systems and Computing, vol 1342. Springer, Cham. https://doi.org/10.1007/978-3-030-70042-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-70042-3_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70041-6
Online ISBN: 978-3-030-70042-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)